Pages
- 1
- 2
- document
-
Oschatz, Quentin (author)This paper explores algorithms to optimize networked caching, where requests for files can be handled by a local cache instead of a remote server. Caches work collaboratively to prevent redundant caching, and each new batch of file requests is used to update the entire network. Data is cached in an integral manner, meaning that only discrete...bachelor thesis 2022
- document
-
Makridis, Pavlos (author)Indirect illumination is an essential part of realistic computer-generated imagery. However, accurate calculation of indirect illumination comes at high compute costs. To this end, we replace lengthy indirect illumination paths by employing an ambient light cache based on photon mapping principles. By only performing cache queries after a...bachelor thesis 2022
- document
-
Admiraal, Gijs (author)The advent of wireless networks such as content distribution networks and edge computing networks calls for more effective online caching policies. Traditional policies lose performance since these new networks deal with highly non-stationary requests and frequent popularity shifts. Consequently, a new framework called Online Convex Optimization...bachelor thesis 2022
- document
-
Lam, Koen (author)In recent years, researchers proposed several universal caching policies. These universal caching policies aim to work well with any request sequence. However, with this universal well-working property, these caching policies sometimes do not work as well as conventional caching policies such as Least-Recently-Used and Least-Frequently-Used....master thesis 2022
- document
-
Verrer, Daan (author)Modern implementations of encryption algorithms on CPU’s that use frequent memory lookups of precomputed functions, are vulnerable to Cache based SideChannel Attacks. The ρ-VEX processor, a runtime reconfigurable VLIW processor developed at the Computer and Quantum Engineering department at the TU Delft was identified to possibly allow for...master thesis 2021
- document
-
Belzer, Nick (author)Mobile networks deal with an increasing portion of the IP Traffic due to the significant growth in the number of mobile devices and the accompanied lifestyle. A large fraction of this IP traffic is spent on duplicate transfers for the same resources. Previous work has shown that a Content Delivery Network (CDN) based on edge-nodes can reduce...master thesis 2021
- document
-
Vermaat, Bas (author)The ρ-VEX is a processor designed at the Computer Engineering lab at TU Delft to be reconfigurable at runtime, resulting in a processor that can combine or separate instruction lanes according to the program requirements. The current cache for the ρ-VEX processor is direct mapped and always identical to the instruction group configuration. This...master thesis 2021
- document
-
Meyer, Johann (author)Aircraft are complex systems with, in some cases, high-dimensional nonlinear interactions between control surfaces. When a failure occurs, adaptive flight control methods can be utilised to stabilise and make the aircraft controllable. Adaptive flight control methods, however, require accurate aerodynamic models - where first-order continuity is...master thesis 2021
- document
-
Kwak, Jeongho (author), Paschos, Georgios (author), Iosifidis, G. (author)The advent of elastic Content Delivery Networks (CDNs) enable Content Providers (CPs) to lease cache capacity on demand and at different cloud and edge locations in order to enhance the quality of their services. This article addresses key challenges in this context, namely how to invest an available budget in cache space in order to match...journal article 2021
- document
-
van Lil, Wouter (author)Using transfer learning, convolutional neural networks for different purposes can have similar layers which can be reused by caching them, reducing their load time. Four ways of loading and executing these layers, bulk, linear, DeepEye and partial loading, were analysed under different memory constraints and different amounts of similar networks...bachelor thesis 2020
- document
-
de Koning, Dorian (author)The gap between CPU and memory performance becomes increasingly larger. Together with a growing memory pressure caused by higher CPU core counts combined with multi-tenant systems, this causes the need for new memory technologies. Recently, various technologies are becoming available for commercial use. Examples of these technologies are memory...master thesis 2020
- document
-
Roth, Thorsten (author), Weier, Martin (author), Bauszat, P. (author), Hinkenjann, André (author), Li, Yongmin (author)Modern Monte-Carlo-based rendering systems still suffer from the computational complexity involved in the generation of noise-free images, making it challenging to synthesize interactive previews. We present a framework suited for rendering such previews of static scenes using a caching technique that builds upon a linkless octree. Our...journal article 2020
- document
-
Metaxas, Konstantinos (author)As the digitisation of the world progresses at an accelerating pace, an overwhelming quantity of data from a variety of sources, of different types, organised in a multitude of forms or not at all, are subjected into diverse analytic processes for specific kinds of value to be extracted out of them. The aggregation of these analytic processes...master thesis 2019
- document
-
Talluri, Sacheendra (author)The proliferation of big-data processing platforms has already led to radically different system designs, such as MapReduce and the newer Spark. Understanding the workloads of such systems enables tuning and could foster new designs. However, whereas MapReduce workloads have been characterized extensively, relatively little public knowledge...master thesis 2018
- document
-
Gupta, Parul (author)Android smartphones collect and compile a huge amount of sensitive information which is secured using cryptography. There is an unintended leakage of information during the physical implementation of a cryptosystem on a device. Such a leakage is often termed as side channel and is used to break the implementation of cryptographic algorithms. In...master thesis 2017
- document
-
Rovers, A (author), Meijers, B.M. (author), van Oosterom, P.J.M. (author)This paper presents a methodology for using a generic data-driven spatial access method as a communication mechanism for vario-scale data in a server-client setting. As a complete data set is often quite large, it is managed at the server side and supporting different scale levels is important. We show that a generic R-tree like grouping method,...conference paper 2017
- document
-
Verhage, A.A. (author)Technolution B.V. is developing a custom Reduced Instruction Set Computer (RISC)-V based softcore for implementation on a Field Programmable Gate Array (FPGA). Previously, the softcore used the memory residing on the FPGA only, which is very limited in capacity and limits scaling. To solve this problem, a connection is made from the softcore to...master thesis 2016
- document
-
Yanik, K.I.M. (author)The trend of increasing performance by parallelism is followed by the adoption of heterogeneous systems. In order to allow more fine-tuned balancing between used thread- and instruction level parallelism, the heterogeneous ρ-VEX platform was developed. Pipelining has been a part of microprocessor development for decades to increase throughput of...master thesis 2016
- document
-
Rovers, A. (author)Vario-scale data structures make it possible to derive maps at arbitrary scale. When requesting a map, data has to be transferred from server to client. This takes time, which affects the responsiveness of the system, and sometimes costs can be involved for every byte that is send over the network. Redundant data transfers should thus be avoided...master thesis 2016
- document
-
Van Straten, J. (author)This thesis describes the design and implementation of a VLIW processor and associated caches based on the ρ-VEX concept. An ρ-VEX processor must be dynamically (runtime) reconfigurable to behave as a single large processor, two medium-sized processors, or four small processors. This allows a scheduler to optimize for energy and/or performance...student report 2016
Pages
- 1
- 2